1 /*- 2 * Copyright (c) 1980, 1992, 1993 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. All advertising materials mentioning features or use of this software 14 * must display the following acknowledgement: 15 * This product includes software developed by the University of 16 * California, Berkeley and its contributors. 17 * 4. Neither the name of the University nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 * 33 * @(#)mbufs.c 8.1 (Berkeley) 6/6/93 34 * $FreeBSD: src/usr.bin/systat/ip.c,v 1.3.2.1 2001/04/25 12:42:18 ru Exp $ 35 * $DragonFly: src/usr.bin/systat/ip.c,v 1.5 2004/05/03 15:18:25 hmp Exp $ 36 */ 37 38 #include <sys/param.h> 39 #include <sys/types.h> 40 #include <sys/socket.h> 41 #include <sys/sysctl.h> 42 43 #include <netinet/in.h> 44 #include <netinet/in_systm.h> 45 #include <netinet/ip.h> 46 #include <netinet/ip_var.h> 47 #include <netinet/udp.h> 48 #include <netinet/udp_var.h> 49 50 #include <stdlib.h> 51 #include <string.h> 52 #include <paths.h> 53 #include "systat.h" 54 #include "extern.h" 55 #include "mode.h" 56 57 struct stat { 58 struct ip_stats i; 59 struct udpstat u; 60 }; 61 62 static struct stat curstat, initstat, oldstat; 63 64 /*- 65 --0 1 2 3 4 5 6 7 66 --0123456789012345678901234567890123456789012345678901234567890123456789012345 67 01 IP Input IP Output 68 02999999999 total packets received 999999999 total packets sent 69 03999999999 - with bad checksums 999999999 - generated locally 70 04999999999 - too short for header 999999999 - output drops 71 05999999999 - too short for data 999999999 output fragments generated 72 06999999999 - with invalid hlen 999999999 - fragmentation failed 73 07999999999 - with invalid length 999999999 destinations unreachable 74 08999999999 - with invalid version 999999999 packets output via raw IP 75 09999999999 - jumbograms 76 10999999999 total fragments received UDP Statistics 77 11999999999 - fragments dropped 999999999 total input packets 78 12999999999 - fragments timed out 999999999 - too short for header 79 13999999999 - packets reassembled ok 999999999 - invalid checksum 80 14999999999 packets forwarded 999999999 - no checksum 81 15999999999 - unreachable dests 999999999 - invalid length 82 16999999999 - redirects generated 999999999 - no socket for dest port 83 17999999999 option errors 999999999 - no socket for broadcast 84 18999999999 unwanted multicasts 999999999 - socket buffer full 85 19999999999 delivered to upper layer 999999999 total output packets 86 --0123456789012345678901234567890123456789012345678901234567890123456789012345 87 --0 1 2 3 4 5 6 7 88 */ 89 90 WINDOW * 91 openip(void) 92 { 93 return (subwin(stdscr, LINES-4-1, 0, 4, 0)); 94 } 95 96 void 97 closeip(WINDOW *w) 98 { 99 if (w == NULL) 100 return; 101 wclear(w); 102 wrefresh(w); 103 delwin(w); 104 } 105 106 void 107 labelip(void) 108 { 109 wmove(wnd, 0, 0); wclrtoeol(wnd); 110 #define L(row, str) mvwprintw(wnd, row, 10, str) 111 #define R(row, str) mvwprintw(wnd, row, 45, str); 112 L(1, "IP Input"); R(1, "IP Output"); 113 L(2, "total packets received"); R(2, "total packets sent"); 114 L(3, "- with bad checksums"); R(3, "- generated locally"); 115 L(4, "- too short for header"); R(4, "- output drops"); 116 L(5, "- too short for data"); R(5, "output fragments generated"); 117 L(6, "- with invalid hlen"); R(6, "- fragmentation failed"); 118 L(7, "- with invalid length"); R(7, "destinations unreachable"); 119 L(8, "- with invalid version"); R(8, "packets output via raw IP"); 120 L(9, "- jumbograms"); 121 L(10, "total fragments received"); R(10, "UDP Statistics"); 122 L(11, "- fragments dropped"); R(11, "total input packets"); 123 L(12, "- fragments timed out"); R(12, "- too short for header"); 124 L(13, "- packets reassembled ok"); R(13, "- invalid checksum"); 125 L(14, "packets forwarded"); R(14, "- no checksum"); 126 L(15, "- unreachable dests"); R(15, "- invalid length"); 127 L(16, "- redirects generated"); R(16, "- no socket for dest port"); 128 L(17, "option errors"); R(17, "- no socket for broadcast"); 129 L(18, "unwanted multicasts"); R(18, "- socket buffer full"); 130 L(19, "delivered to upper layer"); R(19, "total output packets"); 131 #undef L 132 #undef R 133 } 134 135 static void 136 domode(struct stat *ret) 137 { 138 const struct stat *sub; 139 double divisor = 1.0; 140 141 switch(currentmode) { 142 case display_RATE: 143 sub = &oldstat; 144 divisor = naptime; 145 break; 146 case display_DELTA: 147 sub = &oldstat; 148 break; 149 case display_SINCE: 150 sub = &initstat; 151 break; 152 default: 153 *ret = curstat; 154 return; 155 } 156 #define DO(stat) ret->stat = (double)(curstat.stat - sub->stat) / divisor 157 DO(i.ips_total); 158 DO(i.ips_badsum); 159 DO(i.ips_tooshort); 160 DO(i.ips_toosmall); 161 DO(i.ips_badhlen); 162 DO(i.ips_badlen); 163 DO(i.ips_fragments); 164 DO(i.ips_fragdropped); 165 DO(i.ips_fragtimeout); 166 DO(i.ips_forward); 167 DO(i.ips_cantforward); 168 DO(i.ips_redirectsent); 169 DO(i.ips_noproto); 170 DO(i.ips_delivered); 171 DO(i.ips_localout); 172 DO(i.ips_odropped); 173 DO(i.ips_reassembled); 174 DO(i.ips_fragmented); 175 DO(i.ips_ofragments); 176 DO(i.ips_cantfrag); 177 DO(i.ips_badoptions); 178 DO(i.ips_noroute); 179 DO(i.ips_badvers); 180 DO(i.ips_rawout); 181 DO(i.ips_toolong); 182 DO(i.ips_notmember); 183 DO(u.udps_ipackets); 184 DO(u.udps_hdrops); 185 DO(u.udps_badsum); 186 DO(u.udps_nosum); 187 DO(u.udps_badlen); 188 DO(u.udps_noport); 189 DO(u.udps_noportbcast); 190 DO(u.udps_fullsock); 191 DO(u.udps_opackets); 192 #undef DO 193 } 194 195 void 196 showip(void) 197 { 198 struct stat stats; 199 u_long totalout; 200 201 domode(&stats); 202 totalout = stats.i.ips_forward + stats.i.ips_localout; 203 204 #define DO(stat, row, col) \ 205 mvwprintw(wnd, row, col, "%9lu", stats.stat) 206 207 DO(i.ips_total, 2, 0); 208 mvwprintw(wnd, 2, 35, "%9lu", totalout); 209 DO(i.ips_badsum, 3, 0); 210 DO(i.ips_localout, 3, 35); 211 DO(i.ips_tooshort, 4, 0); 212 DO(i.ips_odropped, 4, 35); 213 DO(i.ips_toosmall, 5, 0); 214 DO(i.ips_ofragments, 5, 35); 215 DO(i.ips_badhlen, 6, 0); 216 DO(i.ips_cantfrag, 6, 35); 217 DO(i.ips_badlen, 7, 0); 218 DO(i.ips_noroute, 7, 35); 219 DO(i.ips_badvers, 8, 0); 220 DO(i.ips_rawout, 8, 35); 221 DO(i.ips_toolong, 9, 0); 222 DO(i.ips_fragments, 10, 0); 223 DO(i.ips_fragdropped, 11, 0); 224 DO(u.udps_ipackets, 11, 35); 225 DO(i.ips_fragtimeout, 12, 0); 226 DO(u.udps_hdrops, 12, 35); 227 DO(i.ips_reassembled, 13, 0); 228 DO(u.udps_badsum, 13, 35); 229 DO(i.ips_forward, 14, 0); 230 DO(u.udps_nosum, 14, 35); 231 DO(i.ips_cantforward, 15, 0); 232 DO(u.udps_badlen, 15, 35); 233 DO(i.ips_redirectsent, 16, 0); 234 DO(u.udps_noport, 16, 35); 235 DO(i.ips_badoptions, 17, 0); 236 DO(u.udps_noportbcast, 17, 35); 237 DO(i.ips_notmember, 18, 0); 238 DO(u.udps_fullsock, 18, 35); 239 DO(i.ips_delivered, 19, 0); 240 DO(u.udps_opackets, 19, 35); 241 #undef DO 242 } 243 244 #define CPU_STATS_FUNC(proto,type) \ 245 static void \ 246 proto ##_stats_agg(type *ary, type *ttl, int cpucnt) \ 247 { \ 248 int i, off, siz; \ 249 siz = sizeof(type); \ 250 \ 251 if (!ary && !ttl) \ 252 return; \ 253 \ 254 bzero(ttl, siz); \ 255 if (cpucnt == 1) { \ 256 *ttl = ary[0]; \ 257 } else { \ 258 for (i = 0; i < cpucnt; ++i) { \ 259 for (off = 0; off < siz; off += sizeof(u_long)) { \ 260 *(u_long *)((char *)(*(&ttl)) + off) += \ 261 *(u_long *)((char *)&ary[i] + off); \ 262 } \ 263 } \ 264 } \ 265 } 266 CPU_STATS_FUNC(ip, struct ip_stats); 267 268 static int 269 fetch_ipstats(struct ip_stats *st) 270 { 271 struct ip_stats stattmp[SMP_MAXCPU]; 272 size_t len; 273 int name[4], cpucnt; 274 275 name[0] = CTL_NET; 276 name[1] = PF_INET; 277 name[2] = IPPROTO_IP; 278 name[3] = IPCTL_STATS; 279 280 len = sizeof(struct ip_stats) * SMP_MAXCPU; 281 if (sysctl(name, 4, stattmp, &len, NULL, 0) < 0) { 282 error("sysctl getting ip_stats failed"); 283 return -1; 284 } 285 cpucnt = len / sizeof(struct ip_stats); 286 ip_stats_agg(stattmp, st, cpucnt); 287 288 return 0; 289 } 290 291 int 292 initip(void) 293 { 294 size_t len; 295 int name[4]; 296 297 if (fetch_ipstats(&initstat.i) < 0) 298 return 0; 299 300 name[0] = CTL_NET; 301 name[1] = PF_INET; 302 name[2] = IPPROTO_UDP; 303 name[3] = UDPCTL_STATS; 304 305 len = 0; 306 if (sysctl(name, 4, 0, &len, 0, 0) < 0) { 307 error("sysctl getting udpstat size failed"); 308 return 0; 309 } 310 if (len > sizeof curstat.u) { 311 error("ip_stats structure has grown--recompile systat!"); 312 return 0; 313 } 314 if (sysctl(name, 4, &initstat.u, &len, 0, 0) < 0) { 315 error("sysctl getting udpstat failed"); 316 return 0; 317 } 318 oldstat = initstat; 319 return 1; 320 } 321 322 void 323 resetip(void) 324 { 325 size_t len; 326 int name[4]; 327 328 fetch_ipstats(&initstat.i); 329 330 name[0] = CTL_NET; 331 name[1] = PF_INET; 332 name[2] = IPPROTO_UDP; 333 name[3] = UDPCTL_STATS; 334 335 len = sizeof initstat.u; 336 if (sysctl(name, 4, &initstat.u, &len, 0, 0) < 0) { 337 error("sysctl getting udpstat failed"); 338 } 339 oldstat = initstat; 340 } 341 342 void 343 fetchip(void) 344 { 345 int name[4]; 346 size_t len; 347 348 oldstat = curstat; 349 350 if (fetch_ipstats(&curstat.i) < 0) 351 return; 352 353 name[0] = CTL_NET; 354 name[1] = PF_INET; 355 name[2] = IPPROTO_UDP; 356 name[3] = UDPCTL_STATS; 357 len = sizeof curstat.u; 358 359 if (sysctl(name, 4, &curstat.u, &len, 0, 0) < 0) 360 return; 361 } 362